Professional Documents
Culture Documents
4. ____________ is the total time in seconds it takes to transfer data from source to its
destination.
6. What type of link sends packets of data from a single source to all device connected on the
network?
9. An intermediary device that connects segments within the same network is?
10. When Local Area Networks are used by companies, they are called ______________
11. Ordering books is an example of forms of E-commerce under what type of application?
12. One of the functions of the intermediary device is to generate and transmit signals.
True/False?
13. The standard for wireless LAN’s is called __________ popularly known as _____________
14. What type of networks are found in small offices or residences and are managed from a
single device?
16. Point-to-point transmission with exactly one sender and exactly one receiver is called
___________
17. The transfer of digital or analog data using digital or analog signals refers to _____________
18. It is easier to send signals through the air than through a fiber or over a wire. True/False?
19. What provides the channel over which message travels from source to destination?
22. What links together devices so that data and information can be shared among them?
23. The internet uses ________ networks to connect enterprise networks, home networks and
many other networks.
28. _______________ connects groups of computers and low-voltage devices together across
short distances (within a building or a group of two or three buildings) to share resources.
30. All of the methods of communication have three things in common which are?
34. _____________ is essentially a multiport network bridge and performs the same basic
functions as a bridge, but at faster speeds.
37. ___________________ are physical link addresses for every host device.
38. What relays packets of data between the wireless computers and also between them and
the internet?
39. The components of computer networks can be categorized into?
40. In a broadcast network packets of data are sent from a source to many destinations.
True/False
42. ______________ contains the unique address of the host and address of the receiver(s) on
the network.
45. What is the encapsulated data defined by the Network Access layer in the TCP/IP Model
and Data-link layer in the OSI Model?
46. What protocol is used to discover host's Internet address when it knows only its physical
address?
48. What layer encompasses protocols which directly interact with the user?
49. _____________ is the network terminal protocol which provides login over the network
50. The three main functions of the data link layer are?
51. Which of the layers of the TCP/IP model defines the protocols for setting up the level of
transmission service for applications?
54. ____________ describes how network devices can format and transmit data packets to
other devices on the same Local Area.
55. What network hardware devices operate at the data link layer?
60. The protocol in the Application layer used for interactive file transfer on the internet is?
62. In the layers of the TCP/IP model, the Transport layer is sometimes called the
____________
65. The __________ layer transports data using electrical, mechanical or procedural interfaces.
66. The ________ layer specifies the intra-network operations and different types of addressing
and routing devices.
67. What does the UDP add to the data from the upper layer?
68. What OSI Model Layer acts as a translator between the application and the network?
69. The OSI Model Layers that are the responsibility of the host are?
70. Physical, Data-link and Transport layers of the OSI Model are the responsibility of the
network. True/False?
71. The header and trailer in the Data-link layer contains _____________ and _____________
which is used for ___________
72. What information are found in the header of a frame?
74. What prevents two partied from attempting the same critical operations simultaneously?
75. What OSI Model layer is the closest to the end user?
76. What protocol converts the incoming data stream into smaller units called segments and
passes each one onto the internet layer?
78. Data-link layer of the OSI Model is responsible for Data encryption, Data decryption and
Data compression, Data decompression. True/False?
79. What layer is responsible for translation between different network types?
81. What OSI layers are implemented in the hardware and software?
83. The ____________ layer is responsible for end-to-end delivery of the entire message
between hosts.
84. Which layer in the TCP/IP model is responsible for reliable transmission of data and the
error-free delivery of packet?
85. The primary protocol used to transport data in packets is known as?
90. What kind of access method works on "recovery after the collision"?
92. The single cable in which all the stations are connected in a bus topology is known as?
95. The most common access method of the ring topology is?
98. What kind of access method effectively reduces the possibility of the collision?
99. What type of cable consists of a special jacket to block external interference?
101. What type of mode in coaxial cable is there limited bandwidth in which different signals
travel?
102. What kind of cables are used to connect dissimilar devices together?
105. The core that the optical fibre cable uses is surrounded by a less dense glass or plastic
covering called __________________
106. AM, FM and cordless phones use microwaves for their transmission. True/False?
113. If the backbone breaks, the entire network fails. This is referred to as?
117. What type of signals is transmitted through TV remotes, wireless mouse and keyboard?
118. What type of topology mainly uses 802.3 (ethernet) and 802.4 standard networks?
119. Star topology is laid out so every node in the network is directly connected to one central
hub via _____________________
121. ________ is a network model designed for the end users called Clients, to access the
resources such as data from a central computer known as Server.
122. ___________ refers to the way network devices and services are structured to serve the
connectivity needs of client devices.
124. Key elements to consider when choosing the best topology for your network?
127. What connection devices are mainly used in physical star topology?
128. When the nodes in mesh topology use logic to determine the shortest distance from the
source to destination, this means data is _______________
129. _________ is a network in which all the computers are linked together with equal privilege
and responsibilities for processing the data.
130. _________ topology combines the characteristics of bus topology and star topology.
131. __________ topology is often used for wide area networks to support many spread-out
devices.
132. ____________ topology is mainly used for WAN implementations where communication
failures are a critical concern.
133. All other nodes in tree topology are known as the ______________________
134. When the information is sent to all nodes within the network without the need for routing
logic, this means that data is __________
136. The server in star topology functions as a ______________ which helps prevents data loss
138. What are the four aspects of reliable delivery as part of the services provided by the
transport layer?
139. One of the advantages of mesh topology is that they are incredibly labour intensive.
True/False?
140. The entire network must be offline for devices to be added, removed or modified in star
topology. True/False?
141. What component of SMTP prepares the message, creates the envelope and then puts the
message in the envelope?
142. Mesh topology contains the switch, hub or any central computer which acts as a central
point of communication. True/False?
143. Through what type of connection in FTP, can we transfer a line of command or line of
response at a time? And this connection is made between ______________
145. Since there is only one path exists between two nodes for the data transmission in tree
topology, it forms what kind of hierarchy?
146. The web-like structure of mesh topologies offers two different methods of data
transmission known as?
147. The transport layer protocols are implemented in the network routers. True/False?
148. In the data-link layer, the communication channel that connects the adjacent nodes is
known as?
150. A set of communication guidelines that allow software to transmit an electronic mail over
the internet is called
151. What protocol can be used to transfer the data in the form of plain text, hypertext, audio,
video, and so on?
152. The boundary between the host and link is known as?
153. What type of connection in FTP opens when a command comes for transferring the files
and closes when the file is transferred? And this connection is made between _________
154. _____________ is a process of selecting path along which the data can be transferred from
source to the destination.
156. The first three octets in an IP address specifies ________________ address and the last octet
specifies the _______________ address
157. In a client/server network a server has what kind of OS to provide the resources to the
clients?
158. What layer translates the logical addresses into physical addresses?
159. In class A type of classful addressing, an IP address is assigned to those networks that range
from small-sized to large-sized networks. True/False?
160. What initializes and maintains the routing table for the process of path determination?
161. What protocol allows the users of networks to utilize user-friendly names when looking
for other hosts instead of remembering the IP addresses?
164. What component of SMTP transfers this mail across the internet?
166. What layer provides a logical communication between application processes running on
different hosts?
168. ______________ is a technique in which the administrator manually adds the routes in a
routing table
171. The total number of networks in Class A type of classful addressing is?
172. What is a technique in which a router is configured to send all the packets to the same hop
device, and it doesn't matter whether it belongs to a particular network or not?
173. What organization is best known for its OSI Reference Model?
174. What refers to any technology that manages data traffic to reduce packet loss, latency and
jitter on the network?
175. What is a set of technologies that work on a network to guarantee its ability to
dependably run high priority applications and traffic under limited network capacity?
176. ______________ is the communications sector of the EIA, and is responsible for developing
communications standards.
177. The combined use of several media, such as images, movies, slides, audio, text and
lighting, especially for the purpose of education or entertainment is known as?
179. What organization responsible for coordinating and publishing computer and information
technology standards in the United States?
180. _____________ refers to building the multimedia on network and distributed systems, so
different users on different machines can share image, sound, video, voice and many other
features and to communicate with each other under these tools.
181. _____________ is an international industry association that is best known for publishing
electrical wiring and transmission standards.
182. _____________ was an early and famous example of P2P file sharing?
184. In Query Flooding Architecture, when the peer with requested file is found is known as?
186. When you are accessing a wireless hotspot, or the router in your home or office, your
device is the ____________
187. What are devices that host and control the wireless connection for laptops, tablets, or
smart phones?
188. What allows devices to connect together directly, without an Access Point in-between
controlling the connection?
189. ____________ can be defined as a communications network that is spread out over an
immense land area around the world, connected wirelessly by transceivers at fixed
locations that are known as cell sites or base stations.
190. ______________ is a way of connecting two nodes on a network to communicate with
each other.
191. Data is exchanged between the client and server using ___________ and _________ calls in
socket programming.
192. _________ call is used to associate the socket with a specific network interface and port
number.
193. __________ and ___________ are used to send messages across a network in socket
programming
194. In socket programming, ____________ forms the listening socket and ___________ reaches
out to what forms the listening socket.
195. When a client connects, the server calls _________ to accept or complete the connection,
then the clients calls _________ to establish a connection to the server and initiate the
three-way handshake.